Exam 18: Secure Software Development

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The _______________ model is characterized by a multistep process in which the steps follow each other in a linear,one-way fashion,like water over a waterfall

Free
(Short Answer)
4.8/5
(43)
Correct Answer:
Verified

waterfall

In the secure development lifecycle,how must the specific security needs of software being developed be defined?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

C

Which type of error occurs when a program executes the error checking routine,prior to manipulating strings to a base form?

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

A

The specific security needs of a program being developed should be defined in the design phase of the secure development lifecycle.

(True/False)
4.7/5
(33)

Proper use of _______________ can provide a wealth of programmatic functionality,such as authentication,confidentiality,integrity,and nonrepudiation.

(Short Answer)
4.8/5
(35)

Generating true random numbers is a fairly trivial task.

(True/False)
5.0/5
(29)

What is used to compare program responses to known inputs and comparison of the output to desired output?

(Multiple Choice)
4.8/5
(39)

What are the major types of coding errors and their root cause?

(Essay)
4.8/5
(32)

What are the phases of the software development lifecycle?

(Short Answer)
4.9/5
(41)

In the secure development lifecycle,employing use cases to compare program responses to known inputs,and then comparing the outputs to the desired outputs should take place in which phase?

(Multiple Choice)
4.8/5
(35)

Determining what needs to be accessed,and the appropriate level of permission for every item accessed is an example of what principle?

(Multiple Choice)
4.9/5
(34)

_______________ is the systematic application of a series of malformed inputs to test how the program responds.

(Short Answer)
4.8/5
(21)

How can secure coding be incorporated into the software development process?

(Essay)
4.9/5
(32)

In the secure development lifecycle,in which phase should minimizing the attack surface area take place?

(Multiple Choice)
4.9/5
(26)

The spiral model is characterized by iterative development,where requirements and solutions evolve through an ongoing collaboration between self-organizing,cross-functional teams.

(True/False)
4.8/5
(34)

You are interviewing for a job as a software developer.The interviewer asks you to explain good software development practices.

(Essay)
4.8/5
(37)

When the function of code is changed in an unintended way,it is an example of code injection.

(True/False)
4.8/5
(32)

_______________,historically,has not been an integral part of the software development life cycle.

(Short Answer)
4.8/5
(30)

Which is related to a code injection error?

(Multiple Choice)
4.9/5
(44)

Cryptography is the solution to all security problems.

(True/False)
4.9/5
(31)
Showing 1 - 20 of 40
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)